mirror of https://github.com/minio/minio.git
183 lines
6.4 KiB
Go
183 lines
6.4 KiB
Go
/*
|
||
* Minio Cloud Storage, (C) 2017, 2018 Minio, Inc.
|
||
*
|
||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||
* you may not use this file except in compliance with the License.
|
||
* You may obtain a copy of the License at
|
||
*
|
||
* http://www.apache.org/licenses/LICENSE-2.0
|
||
*
|
||
* Unless required by applicable law or agreed to in writing, software
|
||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
* See the License for the specific language governing permissions and
|
||
* limitations under the License.
|
||
*/
|
||
|
||
package cmd
|
||
|
||
import (
|
||
"errors"
|
||
"os"
|
||
"path/filepath"
|
||
"strconv"
|
||
"strings"
|
||
"time"
|
||
|
||
"github.com/minio/cli"
|
||
"github.com/minio/minio/pkg/auth"
|
||
)
|
||
|
||
// Check for updates and print a notification message
|
||
func checkUpdate(mode string) {
|
||
// Its OK to ignore any errors during doUpdate() here.
|
||
if updateMsg, _, currentReleaseTime, latestReleaseTime, err := getUpdateInfo(2*time.Second, mode); err == nil {
|
||
if globalInplaceUpdateDisabled {
|
||
log.Println(updateMsg)
|
||
} else {
|
||
log.Println(prepareUpdateMessage("Run `minio update`", latestReleaseTime.Sub(currentReleaseTime)))
|
||
}
|
||
}
|
||
}
|
||
|
||
func initConfig() {
|
||
// Config file does not exist, we create it fresh and return upon success.
|
||
if isFile(getConfigFile()) {
|
||
fatalIf(migrateConfig(), "Config migration failed.")
|
||
fatalIf(loadConfig(), "Unable to load config version: '%s'.", serverConfigVersion)
|
||
} else {
|
||
fatalIf(newConfig(), "Unable to initialize minio config for the first time.")
|
||
log.Println("Created minio configuration file successfully at " + getConfigDir())
|
||
}
|
||
}
|
||
|
||
func handleCommonCmdArgs(ctx *cli.Context) {
|
||
|
||
var configDir string
|
||
|
||
if ctx.IsSet("config-dir") {
|
||
configDir = ctx.String("config-dir")
|
||
} else if ctx.GlobalIsSet("config-dir") {
|
||
configDir = ctx.GlobalString("config-dir")
|
||
// cli package does not expose parent's "config-dir" option. Below code is workaround.
|
||
if configDir == "" || configDir == getConfigDir() {
|
||
if ctx.Parent().GlobalIsSet("config-dir") {
|
||
configDir = ctx.Parent().GlobalString("config-dir")
|
||
}
|
||
}
|
||
} else {
|
||
// Neither local nor global config-dir option is provided. In this case, try to use
|
||
// default config directory.
|
||
configDir = getConfigDir()
|
||
if configDir == "" {
|
||
fatalIf(errors.New("missing option"), "config-dir option must be provided.")
|
||
}
|
||
}
|
||
|
||
if configDir == "" {
|
||
fatalIf(errors.New("empty directory"), "Configuration directory cannot be empty.")
|
||
}
|
||
|
||
// Disallow relative paths, figure out absolute paths.
|
||
configDirAbs, err := filepath.Abs(configDir)
|
||
fatalIf(err, "Unable to fetch absolute path for config directory %s", configDir)
|
||
setConfigDir(configDirAbs)
|
||
}
|
||
|
||
func handleCommonEnvVars() {
|
||
// Start profiler if env is set.
|
||
if profiler := os.Getenv("_MINIO_PROFILER"); profiler != "" {
|
||
globalProfiler = startProfiler(profiler)
|
||
}
|
||
|
||
accessKey := os.Getenv("MINIO_ACCESS_KEY")
|
||
secretKey := os.Getenv("MINIO_SECRET_KEY")
|
||
if accessKey != "" && secretKey != "" {
|
||
cred, err := auth.CreateCredentials(accessKey, secretKey)
|
||
fatalIf(err, "Invalid access/secret Key set in environment.")
|
||
|
||
// credential Envs are set globally.
|
||
globalIsEnvCreds = true
|
||
globalActiveCred = cred
|
||
}
|
||
|
||
if browser := os.Getenv("MINIO_BROWSER"); browser != "" {
|
||
browserFlag, err := ParseBrowserFlag(browser)
|
||
if err != nil {
|
||
fatalIf(errors.New("invalid value"), "Unknown value ‘%s’ in MINIO_BROWSER environment variable.", browser)
|
||
}
|
||
|
||
// browser Envs are set globally, this does not represent
|
||
// if browser is turned off or on.
|
||
globalIsEnvBrowser = true
|
||
globalIsBrowserEnabled = bool(browserFlag)
|
||
}
|
||
|
||
traceFile := os.Getenv("MINIO_HTTP_TRACE")
|
||
if traceFile != "" {
|
||
var err error
|
||
globalHTTPTraceFile, err = os.OpenFile(traceFile, os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0660)
|
||
fatalIf(err, "error opening file %s", traceFile)
|
||
}
|
||
|
||
globalDomainName = os.Getenv("MINIO_DOMAIN")
|
||
if globalDomainName != "" {
|
||
globalIsEnvDomainName = true
|
||
}
|
||
|
||
if drives := os.Getenv("MINIO_CACHE_DRIVES"); drives != "" {
|
||
driveList, err := parseCacheDrives(strings.Split(drives, cacheEnvDelimiter))
|
||
fatalIf(err, "Invalid value set in environment variable MINIO_CACHE_DRIVES %s.", drives)
|
||
globalCacheDrives = driveList
|
||
globalIsDiskCacheEnabled = true
|
||
}
|
||
if excludes := os.Getenv("MINIO_CACHE_EXCLUDE"); excludes != "" {
|
||
excludeList, err := parseCacheExcludes(strings.Split(excludes, cacheEnvDelimiter))
|
||
fatalIf(err, "Invalid value set in environment variable MINIO_CACHE_EXCLUDE %s.", excludes)
|
||
globalCacheExcludes = excludeList
|
||
}
|
||
if expiryStr := os.Getenv("MINIO_CACHE_EXPIRY"); expiryStr != "" {
|
||
expiry, err := strconv.Atoi(expiryStr)
|
||
fatalIf(err, "Invalid value set in environment variable MINIO_CACHE_EXPIRY %s.", expiryStr)
|
||
globalCacheExpiry = expiry
|
||
}
|
||
|
||
// In place update is true by default if the MINIO_UPDATE is not set
|
||
// or is not set to 'off', if MINIO_UPDATE is set to 'off' then
|
||
// in-place update is off.
|
||
globalInplaceUpdateDisabled = strings.EqualFold(os.Getenv("MINIO_UPDATE"), "off")
|
||
|
||
// Validate and store the storage class env variables only for XL/Dist XL setups
|
||
if globalIsXL {
|
||
var err error
|
||
|
||
// Check for environment variables and parse into storageClass struct
|
||
if ssc := os.Getenv(standardStorageClassEnv); ssc != "" {
|
||
globalStandardStorageClass, err = parseStorageClass(ssc)
|
||
fatalIf(err, "Invalid value set in environment variable %s.", standardStorageClassEnv)
|
||
}
|
||
|
||
if rrsc := os.Getenv(reducedRedundancyStorageClassEnv); rrsc != "" {
|
||
globalRRStorageClass, err = parseStorageClass(rrsc)
|
||
fatalIf(err, "Invalid value set in environment variable %s.", reducedRedundancyStorageClassEnv)
|
||
}
|
||
|
||
// Validation is done after parsing both the storage classes. This is needed because we need one
|
||
// storage class value to deduce the correct value of the other storage class.
|
||
if globalRRStorageClass.Scheme != "" {
|
||
err = validateParity(globalStandardStorageClass.Parity, globalRRStorageClass.Parity)
|
||
fatalIf(err, "Invalid value set in environment variable %s.", reducedRedundancyStorageClassEnv)
|
||
globalIsStorageClass = true
|
||
}
|
||
|
||
if globalStandardStorageClass.Scheme != "" {
|
||
err = validateParity(globalStandardStorageClass.Parity, globalRRStorageClass.Parity)
|
||
fatalIf(err, "Invalid value set in environment variable %s.", standardStorageClassEnv)
|
||
globalIsStorageClass = true
|
||
}
|
||
}
|
||
|
||
// Get WORM environment variable.
|
||
globalWORMEnabled = strings.EqualFold(os.Getenv("MINIO_WORM"), "on")
|
||
}
|